The four-year structured PhD programme in Dependable and Secure Computing is an internationally oriented programme. A PhD programme at the University of Twente can be started throughout the year. Read more about the related Master's programme in Computer Science if you have yet to start a Master of Science programme. Read about the programme from a student's perspective in the testimonial.
Dependable ICT systems
ICT systems are used as part of an ever-growing variety of applications and form a critical backbone of our societal infrastructure. Malfunctioning or sabotage of ICT systems cause financial expenses at best, cost lives at worse, or may even disrupt society.
An ICT system is called dependable if reliance can be placed justly on the services it delivers. This should be possible despite the occurrence of physical errors, communication problems, software errors, human operator mistakes, or attacks by malicious intruders.
Dependability and security are to be interpreted in the broadest sense of the terms. Depending on the application domain, they include 24/7 availability, absolutely safe and timely behaviour, a guaranteed quality-of-service level, protection of the integrity of financial transactions, enforcement of digital rights and privacy of users.
Dependable ICT is a challenge, because applications tend to be geographically distributed, have increasingly complex and adaptive functionality, are connected via wired or wireless networks, and should be open for interaction with an unknown, sometimes malicious, environment.
Skills from the Master's in Computer Science
In our Master's programme in Computer Science, students will learn and develop traditional and novel methods and techniques for analyzing and constructing dependable and secure systems. Traditional means are fault and intrusion detection, prevention, prediction, removal, and tolerance, so that systems keep working even despite faults, errors, or hackers. Emphasis will be put on computational methods, in the following areas:
- modelling, automated analysis and synthesis of dependable systems;
- algorithms and protocols to enforce dependability and security;
- design of dependable and secure software architectures.